Secret Key Generation and Agreement in UWB Communication Channels

Size: px
Start display at page:

Download "Secret Key Generation and Agreement in UWB Communication Channels"

Transcription

1 Secret Key Genertion nd greement in UW Communiction Chnnels Msoud Ghoreishi Mdiseh, Michel L. McGuire, Stephen S. Neville, Lin Ci, Michel Horie Deprtment of Electricl nd Computer Engineering University of Victori Victori,.C. V8W 3P6, CND Emil: bstrct It hs been shown tht the rdio chnnel impulse response for pir of legitimte Ultr-wide bnd (UW) trnsceivers cn be used to generte secret keys for secure communictions. Pst proposed secret key genertion lgorithms under-exploited the vilble number of secret key bits from the rdio chnnel. This pper proposes new efficient method for genertion of the shred key where the trnsceivers use decoders to resolve the differences in their chnnel impulse response mesurements cused by mesurement noise. To ensure secret key greement, method of public discussion between the two users is performed using the syndrome from Hmming (7,3) binry codes. n lgorithm is proposed to check the equlity of generted keys for both legitimte users, nd ensure error-free secure communiction. The security of this lgorithm hs been verified by VISP. Comprisons re performed with previous work on secret key genertion nd it hs been shown tht this lgorithm relibly genertes longer secret keys in stndrd UW rdio chnnels. Index Terms Ultr Widebnd, Secret Key Genertion, Reciprocity,, Public Discussion, VISP. I. INTRODUCTION The continul development of fster utomtic informtion processing systems hs creted need for high dt rte communictions systems. Ultr-widebnd (UW) wireless communictions systems hve been proposed for next genertion wireless becuse of their high dt rte cpcity s wells s their robustness, cpbility for signl trnsmission through stndrd building mterils, nd simplicity of system design [1]. However, disdvntge of existing wireless communictions systems is the dnger of the integrity of the communictions being compromised. Wireless systems send electromgnetic wves through open spce tht pssive evesdroppers cn intercept. Thus, the security sub-system in wireless systems hs more importnt role thn in wireline systems. chllenge for the designers of UW wireless systems is to develop methods for dt integrity nd security. Recently, novel technique hs been developed to use direct UW chnnel chrcteriztion to generte the secret keys to provide security in the physicl lyer of wireless communictions systems [2], [3]. UW chnnel mesurements re used to crete shred cryptogrphic secret keys for ech given pir of communicting terminls. The utomted genertion of secret key is intrinsiclly sptilly nd temporlly specific, incresing security. Indoor UW chnnels hve been found to be independent for ntenn seprtion distnces of more thn 15.2 cm (6 inches) [4]. Therefore, if resonble distnce seprtes the evesdroppers from ech of the legitimte users, the chnnel impulse response between legitimte users becomes source of shred unique secret informtion. Fig. 1 shows the physicl scenrio of interest in this work. Users nd communicte vi n UW chnnel nd generte shred secret session key bsed on the mutul informtion of their respective chnnel chrcteriztions. There hs been gret del of work in the cryptogrphy community on secret key genertion from noisy observtions of common rndom process [2]. In our cse, the rndom process is rdio chnnel. The bsic ide is tht both legitimte users mke mesurements of rndom process visible to both of them. Then, the legitimte users must reconcile their observtions to reduce the effect of independent noise [5], nd then perform privcy mplifiction to remove cndidte secret key bits observble by third prties [6]. The key to this method is to perform this process nd obtin the highest number of secret key bits without leking informtion to third prties. Systems hve been previously proposed for the use of UW chnnel mesurements for secret key genertion [7]. However, it hs been shown tht these methods do not come close to obtining ll the vilble secret key bits from UW chnnel impulse response mesurements [8]. In this pper, new secret key genertion technique is proposed which genertes lrger numbers of secret key bits from observtions of stndrd UW chnnel models thn previously proposed techniques. The key to this technique is the use of decoders to increse the bit greement probbility between the legitimte users of the chnnel. Public discussion, using Hmming code decoder, llows the legitimte users to reconcile their independently generted secret keys without reducing the security of the generted finl key. The reminder of this pper hs been orgnized s follows. Section II provides n overview of the secret key genertion techniques for UW. The new method of key genertion is lso introduced in this section nd the benefits of this method re described. Section III proposed our verified method for checking the consistency of generted key in both legitimte users sides. In Section IV, the performnce of the proposed lgorithm from simultions is performed. In Section V the conclusions of this pper re given nd some possibilities for future work described.

2 Unsuccessful Evesdropper E trnsmitte r Rised Cosine th in Pu ls e cos( 2 s ( t ) UW Chnnel s ( t ) Step 1 St ep 1 f c t ) cos( 2 f c t ) trnsmitte r R is ed Co si ne thin Puls e Secured UW Chnnel receiver receiver y ( n ) y Envelope Detecto r Envelope Detecto r y y ( n ) Limited Regions of Close Proximity where Evesdropping is Vible Step 2 Smplin g LMS Predicto r Step 3 N N LMS Predicto r Step 3 Smplin g Step 2 LLR computtion Step 4 Step 4 LLR computtion Fig. 1. Physicl scenrio of nd communicting over the UW chnnel secured through the secret key generted directly from the UW chnnel chrcteristics [8]. II. SYSTEM OVERVIEW The bsis of the proposed key genertion system is the electromgnetic theory of reciprocity, stting tht when one of two ntenns with no non-liner components rdites signl, the received signl of the other ntenn is independent of which ntenn is the source ntenn [9]. In other words, the rdio chnnel from ntenn to ntenn is equl to the chnnel from ntenn to ntenn. Trnslting the electromgnetic ntenn reciprocity theorem into communiction system theory, the impulse response of the communiction chnnel from to, h (t), is equl to the impulse response chnnel from to, h (t). The reciprocity theorem indictes tht for two UW trnsceivers nd, the impulse response of their shred rdio chnnel is source of shred informtion tht they cn use for generting secret key to support secure communictions. The only condition is tht the time seprtion between when nd mesure the chnnel must be less thn the chnnel coherence time, T c,defineds the mximum time durtion tht the rdio chnnel impulse response is stble. The ssumed indoor environment llows coherence time of between 1 micro second nd 10 micro seconds to be resonble [10]. lso, for the indoor UW rdio chnnel, it hs been shown tht chnnel reliztions re independent for ntenns more thn 15.2 cm from either or [4]. Therefore, it is difficult for other rdio receivers to obtin the sme chnnel mesurements, nd thus obtin nd s secret key. For secret key genertion from mutul observtions of rndom process, such s the chnnel impulse response, it hs been proven in [11] tht the secret key rte, S(; E), vilble to nd over n open brodcst chnnel with respect to n evesdropper E is upper bounded by S(; E) min[i(y ; Y ),I(Y ; Y Y E )], (1) Step 6 [ ] Mx Likelihood Decision Stndrd rry Hmming (7,3) decoder Fig. 2. Step 5 Reshpe Strem to 7 bits blocks Step 8 nd lower bounded by C K Step 7 b St ep 5 C [ ] Reshpe Strem to 7 bits blocks K b b 0 1 b 2 Step 6 Compute Syndrome with Hmming (7,3) St ep 8 lock Digrm of key genertion pltform S(; E) mx [I(Y ; Y ) I(Y ; Y E ), (2) I(Y ; Y ) I(Y ; Y E )]. where I(Y ; Y ) is the mutul informtion between the chnnel impulse response mesurements with Y, Y, nd Y E being the chnnel mesurements for, nd E respectively. This bound becomes tight when no mutul informtion exists between the chnnel mesurements vilble to the evesdropper E nd those of nd. s stted bove, this cse is relized when the evesdropper is sufficiently fr wy from the legitimte users. Obviously, in such cses, the theoretic secret key rte is mximized.. Key Genertion lgorithm Fig. 2 shows the block digrm of the proposed key genertion lgorithm. This pper proposes the use of decoder to reduce the disgreements in the bit sequences of users nd cused by the mesurement noise. Hmming(7,3) decoder is then used to support required public discussion between nd to confirm their independent genertion of the identicl secret key in mnner which does not expose the key to n evesdropper. The following lgorithm genertes the secret key in n eight step process: Step 1- Trnsceiver sends pulse s(t) to trnsceiver nd then trnsceiver sends pulse of the sme shpe to

3 trnsceiver. s ws mentioned bove, the time seprtion between the pulse trnsmission times must be less thn the coherence time of the chnnel, T c, so both trnsceivers mesure signl resulting from the sme chnnel impulse response. Step 2- So tht the mesurements re not ffected by differences in the locl clock phse, both trnsceivers use non-coherent envelope detector. oth trnsceivers detect nd smple the received signls resulting from the trnsmitted pulse, s(t), plus independent therml noise nd rdio signl interference. Suppose tht the impulse response of the chnnel for the time period of interest is h(t), then the received signl for nd re y (t) = s(t) h(t) +n (t) nd y (t) =s(t) h(t)+n (t) respectively where s(t) h(t) is the convolution of signls s(t) nd h(t). The noise signls n (t) nd n (t) re independent zero men dditive white Gussin noise (WGN) signls with men powers of σ 2 0 = N 0/2. The rndom processes, y (t) nd y (t) re smpled t higher thn their Nyquist rtes, generting the discrete time rndom processes y (kt) nd y (kt), respectively. Step 3 & 4- The next two steps combined models sigmdelt nlog to digitl conversion (ΣΔ-DC) on the received noisy chnnel impulse response wveform. This llows for high resolution quntized version of the signl to be processed by the following error removl stges for key reconcilition. n idel Σ Δ-DC uses liner predictor on n oversmpled signl nd then performs single bit quntiztion on the resulting prediction error. It hs been shown tht this form of quntiztion cn provide excellent quntiztion performnce [12]. For our system, Lest Men Squre (LMS) predictor with three tps is used. Investigtion on second degree sttistics of the prediction error found tht the three tp predictor gve excellent prediction error performnce with little improvement seen with longer prediction filters. We replce the stndrd hrd quntiztion with soft output quntizer bsed on Logrithm Likelihood Rtio (LLR) computtion. n decoder is used in stge 5 to remove the effects of mesurement noise. The use of soft LLR inputs, s opposed to hrd binry decisions, is stndrd prctice for decoders [13]. The definition of LLR is: LLR(y i )=Ln ( ) { } Pr(ci =0 y i ) Q yi σ 0 =Ln ( Pr(c i =1 y i ) 1 Q yi σ 0 ) (3) where c i is the i-th bit of code word, y i is the i-th noisy symbol, Pr (c i = c y i ) is the probbility tht c i = c given the received mesurement vlue y i, nd Q(x) = 1/ 2π x exp ( t 2 /2 ) dt. Step 5- To resolve the effects of therml noise in ech side, n error correction coding is required. y using more robust decoders the potentil of removing error bits will be incresed. In this pper, we propose the use of Low Density Prity Check () error correcting code s decoder for correcting discrepncies cused by therml noise. codes re mong From Chnnel ht ()*() st Fig. 3. Therml Noise n() t + + Therml Noise n() t Envelope Detector () xt Envelope Detector () xt Trnsceiver Signl DC DC Trnsceiver Signl lock Digrm of Mutul Chnnel Mesurements the most powerful codes known. In this step, the LLR vlues from the previous step re blocked into frmes of length equl to the code word length of the code selected nd sent into the decoder. The decoder removes discrepncies, returning vlid code word for the specified code. Some discrepncies will still remin between the two users sequences. It hs been shown tht without public discussion between nd, tht it is impossible for the two users to chieve 100 % greement on secret key [14]. Thus, it is proposed in this pper to use simple public discussion lgorithm bsed on Hmming decoder (7,3) to reconcile the bits. The mesurement model prior to reconcilition is summrized in Fig. 3. Users nd both observe the chnnel impulse, h(t), convolved with the trnsmitted pulse signl, s(t) contminted with independent noise. The resulting signls re converted to digitl signls vi ΣΔ-DC. The bit sequences of both users re sent into identicl decoders to reduce the number of differences between them. Step 6- In this step, the output bit strem from the decoder is grouped into blocks of length 7 nd fed into the decoder of (7,3) Hmming forwrd error correction code to support the public discussion stge of the key genertion lgorithm. Step 7 & 8 (Public Discussion)- efore public discussion, both trnsceivers nd hve nerly identicl bit sequences from the decoders. The purpose of the public discussion is to llow nd to discover wht portion of bit sequences they hve in common, without reveling wht exctly these common bit sequence vlues re to n evesdropper E. In this pper, the syndrome sequence clculted for Hmming binry error correction code is trnsmitted for the public discussion. It is known tht for dt signls contminted by dditive white Gussin noise, the syndrome sequence clculted by the decoder for liner error correction code is independent of the messge bits of the source code word [15]. In the other words, the syndrome sequence, which is trnsmitted over public chnnel nd is vilble to evesdroppers, does not give ny informtion bout the messge bits. sed on this observtion, this pper proposes public discussion bsed on Hmming (7,3) codes. These codes re esy to implement nd hve decoders with low computtionl complexity. In this step, trnsceiver sends the syndrome output of its Hmming decoder to trnsceiver. Trnsceivers then finds C C

4 CDF of greement Error 10-4 SNR= 5d SNR= 10d SNR= 15d SNR= 40d SNR= 45d Fig. 4. lock digrm of Key Vlidtion Process Fig. 5. CDF of key greement error versus key length for Chnnel model CM1 [10] for different SNR. decoder nd Hmming (7,3) codes being used for public discussion. the set of ll 7 bit long sequences which would result in the received syndrome from trnsceiver. It then selects the 7 bit sequences which hs the smllest Hmming distnce from its output from stge 6. This process is only minor vrition from the stndrd Hmming error correction code decoding lgorithm which is known to hve low computtionl cost. For exmple, the bit sequences for ech syndrome cn be found in dvnce nd stored in memory [16]. For public discussion, 4 bits re sent over the public chnnel to help mke key greement. While these 4 bits re now known to ny evesdroppers, the remining 3 messge bits of the Hmming codeword remin secret. These 3 bits form the bsis of the secret key shred between nd. oth nd itertively follow this process, storing the greed upon secret key bits into locl buffers, until the desired secret key length is chieved. III. CHECKING KEY CONSISTENCY t the end of key genertion process, the legitimte users nd hve to mke sure tht they hve generted the sme secret key before they use this key for secure communiction. To perform this check, the following three step lgorithm is proposed. The security of this method in the presence of pssive evesdropper hs been verified using the utomted Vlidtion of Internet Security Protocols nd pplictions (VISP) softwre [17]. First- Trnsceiver select rndom rel number R, encrypts it with its own key K, nd sends the encrypted vlue on the public chnnel, E K (R), to trnsceiver where E K (.) is encryption opertor with key K. Second- Trnsceiver decrypts the received vlue with their own key, does hshing opertion on it, encrypts it with K, nd sends E K (H(D K (E K (R)))) to trnsceiver on the public chnnel where D K (.) nd H(.) re decryption with Key K nd hshing opertors, respectively. Third- Trnsceiver decrypts received with K.Iftheresult is H(R) then trnsceivers sends n OK cknowledge to CDF of greement Error SNR=5d SNR=15d SNR=25d SNR=35d Fig. 6. CDF of key greement error versus key length for Chnnel model CM1 [10] for different SNR. Three bits quntizer nd (3,1) repetition code being used for public discussion [7]. trnsceiver which confirms tht both nd s keys re the sme. On the other hnd, if the result is not equl to H(R) then trnsceiver sends negtive cknowledgement to trnsceiver indicting tht the two trnsceiver s keys re not the sme. It should be noted tht E K (.), D K (.), ndh(.) re ll ssumed public. lso, R cnnot be reused nd must be uniquely generted ech time even if the reply ttck would exist ginst the lgorithm. For our lgorithm, the key checking lgorithm is run on ech block of the key generted from the lgorithm in Section II. In the next Section, we discuss the probbility of trnsceiver nd greeing to the sme key. IV. SIMULTION RESULTS In this work, our lgorithms for key genertion nd greement hs been simulted with two different decoding methods. The simulted communiction chnnel model is the UW chnnel model CM1 from the IEEE p stndrd [10]. The smple time hs been set to nno-seconds. The detectors of this system re simple non-coherent envelope detectors. The

5 CDF of greement Error 10-4 Repetition Code (previous Method) nd Hmming decoders (New Method) Fig. 7. Comprison of CDF of key greement error versus key length for Chnnel model CM1 [10] in SNR =5d with new nd previous methods. trnsmitted pulse signl s(t) is rised cosine signl with pulse durtion of T =20ps with the energy vlue of E s =1. The code used to generte the decoder hs code rte of 1/2, code length of n = 64800, nd messge length of k = Fig. 5 shows the cumultive distribution function for key greement error versus different key length nd signl-energy-to-noise-power rtio (SNR). [ Here, we do not hve consistent definition of SNR with wht generlly is used in dt communiction systems. So tht, the signl is not trnmitted s dt but it is to mesure the chnnel chrcteristic.] When the SNR is incresed, the difference between the received signl for nd decreses so the probbility of key disgreement decreses. The key rte in this simultion is the code rte of decoding, 1/2, times the code rte of Hmming decoding, 3/7, is equl 3/14. From ech 14 bits of chnnel smples, 3 bits cn be shred secret bits for the secret key. To clculte the probbility of error the lgorithm hs been run 100 times nd the number of key disgreements ws recorded. For comprison, the result of the uthors previous work [7] hs been shown in Fig. 6. In this lgorithm three bits liner quntizer hd been used insted of LLR computtion nd decoder blocks. In this prior work, (3,1) repetition code ws used for public discussion insted of the Hmming (7,3) code proposed in this work. with the bove mentioned codes, the syndrome hs two bits length. The key rte of this lgorithm is 1/3. In Fig. 7 the CDF of greement error for SNR =5d with new nd previous methods hs been shown. with the comprison of the results of the two lgorithms, it is obvious tht there is n improvement in key greement lgorithm with nd hmming (7,3) lgorithm. In this method the probbility of error hs been decresed 10 times with respect to the previous lgorithm, three bits quntizer nd (3,1) repetition code. V. CONCLUSION The proposed method for key genertion provides n order of mgnitude improvement over previously reported key genertion methods. This improvement is the result of decoder for reducing the therml noise effect nd Hmming (7,3) decoder which hs been used for public discussion. lso, with secure protocol which hs been proposed for checking the equlity of generted keys in legitimte users sides, the integrity nd security of dt communiction on min chnnel will be gurnteed. CKNOWLEDGMENT This work hs been prtilly supported by reserch grnts from the Cndin Ntionl Science nd Engineering Reserch Council (NSERC). REFERENCES [1] M.Ghvmi,M.L..,ndK.R.,Ultr Widebnd Signls nd Systems in Communiction Engineering, 2nd ed. John Wiley & Sons, [2] R. hlswede nd I. Csiszr, Common rndomness in informtion theory nd cryptogrphy prt I: Secret shring, IEEE Trnsctions on Informtion Theory, vol. 39, no. 4, pp , [3]. Hssn, W. Strk, J. Hershey, nd S. Chennkeshu, Cryptogrphic key greement for mobile rdio, Digitl Signl Processing, cdemic Press, vol. 6, pp , [4] C. Prettie, D. Cheung, L. Rusch, nd M. Ho, Sptil correltion of uwb signls in home environment, Ultr Widebnd Systems nd Technologies, Digest of Ppers IEEE Conference on, pp , [5] G. rssrd nd L. Slvil, Secret-key reconcilition by public discussion, Lecture Notes in Computer Science, vol. 765, p. 410, [6] ennett, rssrd, Crepeu, nd Murer, Generlized privcy mplifiction, IEEE Trnsctions on Informtion Theory, vol. 41, no. 6, pp , [7] M. Ghoreishi Mdiseh, Key Genertion Technique sed on Wireless Chnnels Chrctristics, Mster s thesis, Irn University of Science nd Technology, Tehrn,Irn, July [8] M. Ghoreishi Mdiseh, M. McGuire, S. Neville, nd. eheshti Shirzi, Secret key extrction in ultr widebnd chnnels for unsynchronized rdios, in Proc. CNSR08 IEEE Computer Society Press, My 2008, pp [9] G. Smith, direct derivtion of single-ntenn reciprocity reltion for the time domin, ntenns nd Propgtion, IEEE Trnsctions on, vol. 52, no. 6, pp , June [10] J. Foerster, Chnnel modeling sub-committee report (finl), Feb [11] U. M. Murer, Secret key greement by public discussion from common informtion, IEEE Trnsctions on Informtion Theory, vol. 39, no. 3, pp , My [12] R. Schreier nd G. Temes, Understnding Delt-Sigm Dt Converters. Wiley-IEEE Press, [13] R. Gllger, Low-Density Prity-Check Codes. MIT press, [14] N. Vereshchgin, new proof hlswede - Gcs - Korner theorem on common informtion, Moscow Stte University, September [15] S. Wicker, Error Control Systems for Digitl Communiction nd Storge. Englewood Cliffs, NJ: Prentice Hll, [16] S. Prdhn nd K. Rmchndrn, Distributed source coding using syndromes (discus): design nd construction, Informtion Theory, IEEE Trnsctions on, vol. 49, no. 3, pp , Mr [17]. rmndo, D. sin, Y. oichut, Y. Chevlier, L. Compgn, J. Cuellr, P. Drielsm, P. Hem, O. Kouchnrenko, J. Mntovni, S. Mdersheim, D. von Oheimb, M. Rusinowitch, J. Sntigo, M. Turuni, L. Vign, nd V. L., The VISP tool for the utomted vlidtion of internet security protocols nd pplictions, Proc. Computer ided Verifiction, Lecture Notes in Computer Science, vol. 3576, pp , 2005,

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad Hll Ticket No Question Pper Code: AEC009 INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigl, Hyderd - 500 043 MODEL QUESTION PAPER Four Yer B.Tech V Semester End Exmintions, Novemer - 2018 Regultions:

More information

Multi-beam antennas in a broadband wireless access system

Multi-beam antennas in a broadband wireless access system Multi-em ntenns in rodnd wireless ccess system Ulrik Engström, Mrtin Johnsson, nders Derneryd nd jörn Johnnisson ntenn Reserch Center Ericsson Reserch Ericsson SE-4 84 Mölndl Sweden E-mil: ulrik.engstrom@ericsson.com,

More information

MAXIMUM FLOWS IN FUZZY NETWORKS WITH FUNNEL-SHAPED NODES

MAXIMUM FLOWS IN FUZZY NETWORKS WITH FUNNEL-SHAPED NODES MAXIMUM FLOWS IN FUZZY NETWORKS WITH FUNNEL-SHAPED NODES Romn V. Tyshchuk Informtion Systems Deprtment, AMI corportion, Donetsk, Ukrine E-mil: rt_science@hotmil.com 1 INTRODUCTION During the considertion

More information

Secret Key Generation and Agreement in UWB Communication Channels 1

Secret Key Generation and Agreement in UWB Communication Channels 1 Secret Key Generation and Agreement in UWB Communication Channels 1 Masoud Ghoreishi Madiseh Dept. of Electrical and Computer Engineering University of Victoria P.O. Box 3055 STN CSC Victoria, B.C. V8W

More information

Study on SLT calibration method of 2-port waveguide DUT

Study on SLT calibration method of 2-port waveguide DUT Interntionl Conference on Advnced Electronic cience nd Technology (AET 206) tudy on LT clibrtion method of 2-port wveguide DUT Wenqing Luo, Anyong Hu, Ki Liu nd Xi Chen chool of Electronics nd Informtion

More information

Interference Cancellation Method without Feedback Amount for Three Users Interference Channel

Interference Cancellation Method without Feedback Amount for Three Users Interference Channel Open Access Librry Journl 07, Volume, e57 ISSN Online: -97 ISSN Print: -9705 Interference Cncelltion Method without Feedbc Amount for Three Users Interference Chnnel Xini Tin, otin Zhng, Wenie Ji School

More information

Information-Coupled Turbo Codes for LTE Systems

Information-Coupled Turbo Codes for LTE Systems Informtion-Coupled Turbo Codes for LTE Systems Lei Yng, Yixun Xie, Xiowei Wu, Jinhong Yun, Xingqing Cheng nd Lei Wn rxiv:709.06774v [cs.it] 20 Sep 207 Abstrct We propose new clss of informtion-coupled

More information

Synchronous Machine Parameter Measurement

Synchronous Machine Parameter Measurement Synchronous Mchine Prmeter Mesurement 1 Synchronous Mchine Prmeter Mesurement Introduction Wound field synchronous mchines re mostly used for power genertion but lso re well suited for motor pplictions

More information

METHOD OF LOCATION USING SIGNALS OF UNKNOWN ORIGIN. Inventor: Brian L. Baskin

METHOD OF LOCATION USING SIGNALS OF UNKNOWN ORIGIN. Inventor: Brian L. Baskin METHOD OF LOCATION USING SIGNALS OF UNKNOWN ORIGIN Inventor: Brin L. Bskin 1 ABSTRACT The present invention encompsses method of loction comprising: using plurlity of signl trnsceivers to receive one or

More information

Soft-decision Viterbi Decoding with Diversity Combining. T.Sakai, K.Kobayashi, S.Kubota, M.Morikura, S.Kato

Soft-decision Viterbi Decoding with Diversity Combining. T.Sakai, K.Kobayashi, S.Kubota, M.Morikura, S.Kato Softdecision Viterbi Decoding with Diversity Combining T.Ski, K.Kobyshi, S.Kubot, M.Morikur, S.Kto NTT Rdio Communiction Systems Lbortories 2356 Tke, Yokosukshi, Kngw, 2383 Jpn ABSTRACT Diversity combining

More information

Synchronous Machine Parameter Measurement

Synchronous Machine Parameter Measurement Synchronous Mchine Prmeter Mesurement 1 Synchronous Mchine Prmeter Mesurement Introduction Wound field synchronous mchines re mostly used for power genertion but lso re well suited for motor pplictions

More information

Y9.ET1.3 Implementation of Secure Energy Management against Cyber/physical Attacks for FREEDM System

Y9.ET1.3 Implementation of Secure Energy Management against Cyber/physical Attacks for FREEDM System Y9.ET1.3 Implementtion of Secure Energy ngement ginst Cyber/physicl Attcks for FREED System Project Leder: Fculty: Students: Dr. Bruce cillin Dr. o-yuen Chow Jie Dun 1. Project Gols Develop resilient cyber-physicl

More information

Exercise 1-1. The Sine Wave EXERCISE OBJECTIVE DISCUSSION OUTLINE. Relationship between a rotating phasor and a sine wave DISCUSSION

Exercise 1-1. The Sine Wave EXERCISE OBJECTIVE DISCUSSION OUTLINE. Relationship between a rotating phasor and a sine wave DISCUSSION Exercise 1-1 The Sine Wve EXERCISE OBJECTIVE When you hve completed this exercise, you will be fmilir with the notion of sine wve nd how it cn be expressed s phsor rotting round the center of circle. You

More information

ABB STOTZ-KONTAKT. ABB i-bus EIB Current Module SM/S Intelligent Installation Systems. User Manual SM/S In = 16 A AC Un = 230 V AC

ABB STOTZ-KONTAKT. ABB i-bus EIB Current Module SM/S Intelligent Installation Systems. User Manual SM/S In = 16 A AC Un = 230 V AC User Mnul ntelligent nstlltion Systems A B 1 2 3 4 5 6 7 8 30 ma 30 ma n = AC Un = 230 V AC 30 ma 9 10 11 12 C ABB STOTZ-KONTAKT Appliction Softwre Current Vlue Threshold/1 Contents Pge 1 Device Chrcteristics...

More information

Experiment 3: Non-Ideal Operational Amplifiers

Experiment 3: Non-Ideal Operational Amplifiers Experiment 3: Non-Idel Opertionl Amplifiers Fll 2009 Equivlent Circuits The bsic ssumptions for n idel opertionl mplifier re n infinite differentil gin ( d ), n infinite input resistnce (R i ), zero output

More information

CHAPTER 2 LITERATURE STUDY

CHAPTER 2 LITERATURE STUDY CHAPTER LITERATURE STUDY. Introduction Multipliction involves two bsic opertions: the genertion of the prtil products nd their ccumultion. Therefore, there re two possible wys to speed up the multipliction:

More information

Simulation of Transformer Based Z-Source Inverter to Obtain High Voltage Boost Ability

Simulation of Transformer Based Z-Source Inverter to Obtain High Voltage Boost Ability Interntionl Journl of cience, Engineering nd Technology Reserch (IJETR), olume 4, Issue 1, October 15 imultion of Trnsformer Bsed Z-ource Inverter to Obtin High oltge Boost Ability A.hnmugpriy 1, M.Ishwry

More information

Experiment 3: Non-Ideal Operational Amplifiers

Experiment 3: Non-Ideal Operational Amplifiers Experiment 3: Non-Idel Opertionl Amplifiers 9/11/06 Equivlent Circuits The bsic ssumptions for n idel opertionl mplifier re n infinite differentil gin ( d ), n infinite input resistnce (R i ), zero output

More information

The Discussion of this exercise covers the following points:

The Discussion of this exercise covers the following points: Exercise 4 Bttery Chrging Methods EXERCISE OBJECTIVE When you hve completed this exercise, you will be fmilir with the different chrging methods nd chrge-control techniques commonly used when chrging Ni-MI

More information

To provide data transmission in indoor

To provide data transmission in indoor Hittite Journl of Science nd Engineering, 2018, 5 (1) 25-29 ISSN NUMBER: 2148-4171 DOI: 10.17350/HJSE19030000074 A New Demodultor For Inverse Pulse Position Modultion Technique Mehmet Sönmez Osmniye Korkut

More information

Algorithms for Memory Hierarchies Lecture 14

Algorithms for Memory Hierarchies Lecture 14 Algorithms for emory Hierrchies Lecture 4 Lecturer: Nodri Sitchinv Scribe: ichel Hmnn Prllelism nd Cche Obliviousness The combintion of prllelism nd cche obliviousness is n ongoing topic of reserch, in

More information

Lecture 16: Four Quadrant operation of DC Drive (or) TYPE E Four Quadrant chopper Fed Drive: Operation

Lecture 16: Four Quadrant operation of DC Drive (or) TYPE E Four Quadrant chopper Fed Drive: Operation Lecture 16: Four Qudrnt opertion of DC Drive (or) TYPE E Four Qudrnt chopper Fed Drive: Opertion The rmture current I is either positive or negtive (flow in to or wy from rmture) the rmture voltge is lso

More information

University of North Carolina-Charlotte Department of Electrical and Computer Engineering ECGR 4143/5195 Electrical Machinery Fall 2009

University of North Carolina-Charlotte Department of Electrical and Computer Engineering ECGR 4143/5195 Electrical Machinery Fall 2009 Problem 1: Using DC Mchine University o North Crolin-Chrlotte Deprtment o Electricl nd Computer Engineering ECGR 4143/5195 Electricl Mchinery Fll 2009 Problem Set 4 Due: Thursdy October 8 Suggested Reding:

More information

Kirchhoff s Rules. Kirchhoff s Laws. Kirchhoff s Rules. Kirchhoff s Laws. Practice. Understanding SPH4UW. Kirchhoff s Voltage Rule (KVR):

Kirchhoff s Rules. Kirchhoff s Laws. Kirchhoff s Rules. Kirchhoff s Laws. Practice. Understanding SPH4UW. Kirchhoff s Voltage Rule (KVR): SPH4UW Kirchhoff s ules Kirchhoff s oltge ule (K): Sum of voltge drops round loop is zero. Kirchhoff s Lws Kirchhoff s Current ule (KC): Current going in equls current coming out. Kirchhoff s ules etween

More information

Synchronous Generator Line Synchronization

Synchronous Generator Line Synchronization Synchronous Genertor Line Synchroniztion 1 Synchronous Genertor Line Synchroniztion Introduction One issue in power genertion is synchronous genertor strting. Typiclly, synchronous genertor is connected

More information

Solutions to exercise 1 in ETS052 Computer Communication

Solutions to exercise 1 in ETS052 Computer Communication Solutions to exercise in TS52 Computer Communiction 23 Septemer, 23 If it occupies millisecond = 3 seconds, then second is occupied y 3 = 3 its = kps. kps If it occupies 2 microseconds = 2 6 seconds, then

More information

MEASURE THE CHARACTERISTIC CURVES RELEVANT TO AN NPN TRANSISTOR

MEASURE THE CHARACTERISTIC CURVES RELEVANT TO AN NPN TRANSISTOR Electricity Electronics Bipolr Trnsistors MEASURE THE HARATERISTI URVES RELEVANT TO AN NPN TRANSISTOR Mesure the input chrcteristic, i.e. the bse current IB s function of the bse emitter voltge UBE. Mesure

More information

On the Prediction of EPON Traffic Using Polynomial Fitting in Optical Network Units

On the Prediction of EPON Traffic Using Polynomial Fitting in Optical Network Units On the Prediction of EP Trffic Using Polynomil Fitting in Opticl Networ Units I. Mmounis (1),(3), K. Yinnopoulos (2), G. Ppdimitriou (4), E. Vrvrigos (1),(3) (1) Computer Technology Institute nd Press

More information

Design and Modeling of Substrate Integrated Waveguide based Antenna to Study the Effect of Different Dielectric Materials

Design and Modeling of Substrate Integrated Waveguide based Antenna to Study the Effect of Different Dielectric Materials Design nd Modeling of Substrte Integrted Wveguide bsed Antenn to Study the Effect of Different Dielectric Mterils Jgmeet Kour 1, Gurpdm Singh 1, Sndeep Ary 2 1Deprtment of Electronics nd Communiction Engineering,

More information

Electrically Large Zero-Phase-Shift Metamaterial-based Grid Array Antenna for UHF Near-Field RFID Readers

Electrically Large Zero-Phase-Shift Metamaterial-based Grid Array Antenna for UHF Near-Field RFID Readers Electriclly Lrge Zero-Phse-Shift Metmteril-bsed Grid Arry Antenn for UHF Ner-Field RFID Reders Jin Shi, Xinming Qing, member IEEE, Zhi Ning Chen, Fellow, IEEE Abstrct A grid rry ntenn using zero-phse-shift

More information

CS 135: Computer Architecture I. Boolean Algebra. Basic Logic Gates

CS 135: Computer Architecture I. Boolean Algebra. Basic Logic Gates Bsic Logic Gtes : Computer Architecture I Boolen Algebr Instructor: Prof. Bhgi Nrhri Dept. of Computer Science Course URL: www.ses.gwu.edu/~bhgiweb/cs35/ Digitl Logic Circuits We sw how we cn build the

More information

TIME: 1 hour 30 minutes

TIME: 1 hour 30 minutes UNIVERSITY OF AKRON DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING 4400: 34 INTRODUCTION TO COMMUNICATION SYSTEMS - Spring 07 SAMPLE FINAL EXAM TIME: hour 30 minutes INSTRUCTIONS: () Write your nme

More information

Multipath Fading Measurements for Multi-Antenna Backscatter RFID at 5.8 GHz

Multipath Fading Measurements for Multi-Antenna Backscatter RFID at 5.8 GHz Multipth Fding Mesurements for Multi-Antenn Bcksctter RFID t 5.8 GHz Joshu D. Griffin 1 nd Gregory D. Durgin 2 School of Electricl nd Computer Engineering, Georgi Institute of Technology 777 Atlntic Dr.,

More information

Efficient and Resilient Key Discovery based on Pseudo-Random Key Pre-Deployment

Efficient and Resilient Key Discovery based on Pseudo-Random Key Pre-Deployment Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 1 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment Roerto Di Pietro, Luigi V. Mncini, nd Alessndro

More information

A Novel Back EMF Zero Crossing Detection of Brushless DC Motor Based on PWM

A Novel Back EMF Zero Crossing Detection of Brushless DC Motor Based on PWM A ovel Bck EMF Zero Crossing Detection of Brushless DC Motor Bsed on PWM Zhu Bo-peng Wei Hi-feng School of Electricl nd Informtion, Jingsu niversity of Science nd Technology, Zhenjing 1003 Chin) Abstrct:

More information

A Development of Earthing-Resistance-Estimation Instrument

A Development of Earthing-Resistance-Estimation Instrument A Development of Erthing-Resistnce-Estimtion Instrument HITOSHI KIJIMA Abstrct: - Whenever erth construction work is done, the implnted number nd depth of electrodes hve to be estimted in order to obtin

More information

This is a repository copy of Effect of power state on absorption cross section of personal computer components.

This is a repository copy of Effect of power state on absorption cross section of personal computer components. This is repository copy of Effect of power stte on bsorption cross section of personl computer components. White Rose Reserch Online URL for this pper: http://eprints.whiterose.c.uk/10547/ Version: Accepted

More information

Discontinued AN6262N, AN6263N. (planed maintenance type, maintenance type, planed discontinued typed, discontinued type)

Discontinued AN6262N, AN6263N. (planed maintenance type, maintenance type, planed discontinued typed, discontinued type) ICs for Cssette, Cssette Deck ANN, ANN Puse Detection s of Rdio Cssette, Cssette Deck Overview The ANN nd the ANN re the puse detection integrted circuits which select the progrm on the cssette tpe. In

More information

Polar Coordinates. July 30, 2014

Polar Coordinates. July 30, 2014 Polr Coordintes July 3, 4 Sometimes it is more helpful to look t point in the xy-plne not in terms of how fr it is horizontlly nd verticlly (this would men looking t the Crtesin, or rectngulr, coordintes

More information

ECE 274 Digital Logic. Digital Design. Datapath Components Shifters, Comparators, Counters, Multipliers Digital Design

ECE 274 Digital Logic. Digital Design. Datapath Components Shifters, Comparators, Counters, Multipliers Digital Design ECE 27 Digitl Logic Shifters, Comprtors, Counters, Multipliers Digitl Design..7 Digitl Design Chpter : Slides to ccompny the textbook Digitl Design, First Edition, by Frnk Vhid, John Wiley nd Sons Publishers,

More information

Lecture 20. Intro to line integrals. Dan Nichols MATH 233, Spring 2018 University of Massachusetts.

Lecture 20. Intro to line integrals. Dan Nichols MATH 233, Spring 2018 University of Massachusetts. Lecture 2 Intro to line integrls Dn Nichols nichols@mth.umss.edu MATH 233, Spring 218 University of Msschusetts April 12, 218 (2) onservtive vector fields We wnt to determine if F P (x, y), Q(x, y) is

More information

Address for Correspondence

Address for Correspondence Mrndn et l., Interntionl Journl of Advnced Engineering Technology E-ISSN 0976-3945 Reserch Pper A LATTICE REDUCTION-AIDED INFORMATION PRECODER FOR MULTIUSER COMMUNICATION SYSTEM S. Mrndn, N. Venteswrn

More information

Dataflow Language Model. DataFlow Models. Applications of Dataflow. Dataflow Languages. Kahn process networks. A Kahn Process (1)

Dataflow Language Model. DataFlow Models. Applications of Dataflow. Dataflow Languages. Kahn process networks. A Kahn Process (1) The slides contin revisited mterils from: Peter Mrwedel, TU Dortmund Lothr Thiele, ETH Zurich Frnk Vhid, University of liforni, Riverside Dtflow Lnguge Model Drsticlly different wy of looking t computtion:

More information

Investigation of Ground Frequency Characteristics

Investigation of Ground Frequency Characteristics Journl of Electromgnetic Anlysis nd Applictions, 03, 5, 3-37 http://dx.doi.org/0.436/jem.03.58050 Published Online August 03 (http://www.scirp.org/journl/jem) Mohmed Nyel Electricl Engineering Deprtment,

More information

First Round Solutions Grades 4, 5, and 6

First Round Solutions Grades 4, 5, and 6 First Round Solutions Grdes 4, 5, nd 1) There re four bsic rectngles not mde up of smller ones There re three more rectngles mde up of two smller ones ech, two rectngles mde up of three smller ones ech,

More information

Modeling of Conduction and Switching Losses in Three-Phase Asymmetric Multi-Level Cascaded Inverter

Modeling of Conduction and Switching Losses in Three-Phase Asymmetric Multi-Level Cascaded Inverter Proceedings of the 5th WEA nt. onf. on Power ystems nd Electromgnetic omptibility, orfu, Greece, August 23-25, 2005 (pp176-181) Modeling of onduction nd witching Losses in Three-Phse Asymmetric Multi-Level

More information

Section 17.2: Line Integrals. 1 Objectives. 2 Assignments. 3 Maple Commands. 1. Compute line integrals in IR 2 and IR Read Section 17.

Section 17.2: Line Integrals. 1 Objectives. 2 Assignments. 3 Maple Commands. 1. Compute line integrals in IR 2 and IR Read Section 17. Section 7.: Line Integrls Objectives. ompute line integrls in IR nd IR 3. Assignments. Red Section 7.. Problems:,5,9,,3,7,,4 3. hllenge: 6,3,37 4. Red Section 7.3 3 Mple ommnds Mple cn ctully evlute line

More information

(1) Non-linear system

(1) Non-linear system Liner vs. non-liner systems in impednce mesurements I INTRODUCTION Electrochemicl Impednce Spectroscopy (EIS) is n interesting tool devoted to the study of liner systems. However, electrochemicl systems

More information

Sequential Logic (2) Synchronous vs Asynchronous Sequential Circuit. Clock Signal. Synchronous Sequential Circuits. FSM Overview 9/10/12

Sequential Logic (2) Synchronous vs Asynchronous Sequential Circuit. Clock Signal. Synchronous Sequential Circuits. FSM Overview 9/10/12 9//2 Sequentil (2) ENGG5 st Semester, 22 Dr. Hden So Deprtment of Electricl nd Electronic Engineering http://www.eee.hku.hk/~engg5 Snchronous vs Asnchronous Sequentil Circuit This Course snchronous Sequentil

More information

A Comparative Analysis of Algorithms for Determining the Peak Position of a Stripe to Sub-pixel Accuracy

A Comparative Analysis of Algorithms for Determining the Peak Position of a Stripe to Sub-pixel Accuracy A Comprtive Anlysis of Algorithms for Determining the Pek Position of Stripe to Sub-pixel Accurcy D.K.Nidu R.B.Fisher Deprtment of Artificil Intelligence, University of Edinburgh 5 Forrest Hill, Edinburgh

More information

CSI-SF: Estimating Wireless Channel State Using CSI Sampling & Fusion

CSI-SF: Estimating Wireless Channel State Using CSI Sampling & Fusion CSI-SF: Estimting Wireless Chnnel Stte Using CSI Smpling & Fusion Riccrdo Crepldi, Jeongkeun Lee, Rul Etkin, Sung-Ju Lee, Robin Krvets University of Illinois t Urbn-Chmpign Hewlett-Pckrd Lbortories Emil:{rcrepl,rhk}@illinoisedu,

More information

A COMPARISON OF CIRCUIT IMPLEMENTATIONS FROM A SECURITY PERSPECTIVE

A COMPARISON OF CIRCUIT IMPLEMENTATIONS FROM A SECURITY PERSPECTIVE A COMPARISON OF CIRCUIT IMPLEMENTATIONS FROM A SECURITY PERSPECTIVE Mster Thesis Division of Electronic Devices Deprtment of Electricl Engineering Linköping University y Timmy Sundström LITH-ISY-EX--05/3698--SE

More information

2016 2Q Wireless Communication Engineering. #10 Spread Spectrum & Code Division Multiple Access (CDMA)

2016 2Q Wireless Communication Engineering. #10 Spread Spectrum & Code Division Multiple Access (CDMA) 16 Q Wireless Communiction Engineering #1 Spred Spectrum & Code Division Multiple Access (CDMA Kei Skguchi skguchi@mobile.ee. July 9, 16 Course Schedule ( Dte ext Contents #7 July 15 4.6 Error correction

More information

CHARACTERISTICS OF THE GPS SIGNAL SCINTILLATIONS DURING IONOSPHERIC IRREGULARITIES AND THEIR EFFECTS OVER THE GPS SYSTEM

CHARACTERISTICS OF THE GPS SIGNAL SCINTILLATIONS DURING IONOSPHERIC IRREGULARITIES AND THEIR EFFECTS OVER THE GPS SYSTEM CHRCTERISTICS OF THE GPS SIGNL SCINTILLTIONS DURING IONOSPHERIC IRREGULRITIES ND THEIR EFFECTS OVER THE GPS SYSTEM Eurico R. de Paula, I.J.Kantor, L.F.C. de Rezende ERONOMY DIVISION NTIONL INSTITUTE FOR

More information

4110 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 66, NO. 5, MAY 2017

4110 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 66, NO. 5, MAY 2017 40 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 66, NO. 5, MAY 07 Trnsmit Power Control for DD-Underlid Cellulr Networs Bsed on Sttisticl Fetures Peng Sun, Kng G. Shin, Life Fellow, IEEE, Hilin Zhng,

More information

DYE SOLUBILITY IN SUPERCRITICAL CARBON DIOXIDE FLUID

DYE SOLUBILITY IN SUPERCRITICAL CARBON DIOXIDE FLUID THERMAL SCIENCE, Yer 2015, Vol. 19, No. 4, pp. 1311-1315 1311 DYE SOLUBILITY IN SUPERCRITICAL CARBON DIOXIDE FLUID by Jun YAN, Li-Jiu ZHENG *, Bing DU, Yong-Fng QIAN, nd Fng YE Lioning Provincil Key Lbortory

More information

Redundancy Data Elimination Scheme Based on Stitching Technique in Image Senor Networks

Redundancy Data Elimination Scheme Based on Stitching Technique in Image Senor Networks Sensors & Trnsducers 204 by IFSA Publishing, S. L. http://www.sensorsportl.com Redundncy Dt Elimintion Scheme Bsed on Stitching Technique in Imge Senor Networks hunling Tng hongqing Technology nd Business

More information

Mixed CMOS PTL Adders

Mixed CMOS PTL Adders Anis do XXVI Congresso d SBC WCOMPA l I Workshop de Computção e Aplicções 14 20 de julho de 2006 Cmpo Grnde, MS Mixed CMOS PTL Adders Déor Mott, Reginldo d N. Tvres Engenhri em Sistems Digitis Universidde

More information

High-speed Simulation of the GPRS Link Layer

High-speed Simulation of the GPRS Link Layer 989 High-speed Simultion of the GPRS Link Lyer J Gozlvez nd J Dunlop Deprtment of Electronic nd Electricl Engineering, University of Strthclyde 204 George St, Glsgow G-lXW, Scotlnd Tel: +44 4 548 206,

More information

Jamming-Resistant Collaborative Broadcast In Wireless Networks, Part II: Multihop Networks

Jamming-Resistant Collaborative Broadcast In Wireless Networks, Part II: Multihop Networks Jmming-Resistnt ollbortive Brodcst In Wireless Networks, Prt II: Multihop Networks Ling Xio Ximen University, hin 361005 Emil: lxio@xmu.edu.cn Huiyu Di N Stte University, Rleigh, N 27695 Emil: huiyu di@ncsu.edu

More information

Electronic Circuits I - Tutorial 03 Diode Applications I

Electronic Circuits I - Tutorial 03 Diode Applications I Electronic Circuits I - Tutoril 03 Diode Applictions I -1 / 9 - T & F # Question 1 A diode cn conduct current in two directions with equl ese. F 2 When reverse-bised, diode idelly ppers s short. F 3 A

More information

CDMA One. International summer students courses: "Plugged In: Modern Networks and Services in Telecommunication"

CDMA One. International summer students courses: Plugged In: Modern Networks and Services in Telecommunication INTRAROM S.A. ROMANIAN TELECOMMUNICATIONS AND ELECTRONICS INDUSTRY ROMANIA, Buchrest, 17 Fbric de Glucoz St., Sector 2 Cod 72322, Tel:(+40 1) 2040600 Fx:(+40 1) 2040611 http://www.intrrom.ro Interntionl

More information

DESIGN OF CONTINUOUS LAG COMPENSATORS

DESIGN OF CONTINUOUS LAG COMPENSATORS DESIGN OF CONTINUOUS LAG COMPENSATORS J. Pulusová, L. Körösi, M. Dúbrvská Institute of Robotics nd Cybernetics, Slovk University of Technology, Fculty of Electricl Engineering nd Informtion Technology

More information

Digital Design. Chapter 1: Introduction

Digital Design. Chapter 1: Introduction Digitl Design Chpter : Introduction Slides to ccompny the textbook Digitl Design, with RTL Design, VHDL, nd Verilog, 2nd Edition, by, John Wiley nd Sons Publishers, 2. http://www.ddvhid.com Copyright 2

More information

EXIT CHARTS FOR TURBO RECEIVERS IN MIMO SYSTEMS

EXIT CHARTS FOR TURBO RECEIVERS IN MIMO SYSTEMS EXIT CHATS FO TUBO ECEIVES IN MIMO SYSTEMS Césr Hermosill Universidd Técnic Federico Snt Mrí Vlpríso, Chile hermosil@inrs-telecomuquebecc Leszek Szczeciński Institut Ntionl de l echerche Scientifique-EMT

More information

Three-Phase Synchronous Machines The synchronous machine can be used to operate as: 1. Synchronous motors 2. Synchronous generators (Alternator)

Three-Phase Synchronous Machines The synchronous machine can be used to operate as: 1. Synchronous motors 2. Synchronous generators (Alternator) Three-Phse Synchronous Mchines The synchronous mchine cn be used to operte s: 1. Synchronous motors 2. Synchronous genertors (Alterntor) Synchronous genertor is lso referred to s lterntor since it genertes

More information

Convolutional Networks. Lecture slides for Chapter 9 of Deep Learning Ian Goodfellow

Convolutional Networks. Lecture slides for Chapter 9 of Deep Learning Ian Goodfellow Convolutionl Networks Lecture slides for Chpter 9 of Deep Lerning In Goodfellow 2016-09-12 Convolutionl Networks Scle up neurl networks to process very lrge imges / video sequences Sprse connections Prmeter

More information

CHAPTER 3 AMPLIFIER DESIGN TECHNIQUES

CHAPTER 3 AMPLIFIER DESIGN TECHNIQUES CHAPTER 3 AMPLIFIER DEIGN TECHNIQUE 3.0 Introduction olid-stte microwve mplifiers ply n importnt role in communiction where it hs different pplictions, including low noise, high gin, nd high power mplifiers.

More information

Module 9. DC Machines. Version 2 EE IIT, Kharagpur

Module 9. DC Machines. Version 2 EE IIT, Kharagpur Module 9 DC Mchines Version EE IIT, Khrgpur esson 40 osses, Efficiency nd Testing of D.C. Mchines Version EE IIT, Khrgpur Contents 40 osses, efficiency nd testing of D.C. mchines (esson-40) 4 40.1 Gols

More information

Application Note. Differential Amplifier

Application Note. Differential Amplifier Appliction Note AN367 Differentil Amplifier Author: Dve n Ess Associted Project: Yes Associted Prt Fmily: CY8C9x66, CY8C7x43, CY8C4x3A PSoC Designer ersion: 4. SP3 Abstrct For mny sensing pplictions, desirble

More information

Energy Harvesting Two-Way Channels With Decoding and Processing Costs

Energy Harvesting Two-Way Channels With Decoding and Processing Costs IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING, VOL., NO., MARCH 07 3 Energy Hrvesting Two-Wy Chnnels With Decoding nd Processing Costs Ahmed Arf, Student Member, IEEE, Abdulrhmn Bknin, Student

More information

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-297 Technicl notes on using Anlog Devices DSPs, processors nd development tools Visit our Web resources http://www.nlog.com/ee-notes nd http://www.nlog.com/processors or e-mil

More information

(CATALYST GROUP) B"sic Electric"l Engineering

(CATALYST GROUP) Bsic Electricl Engineering (CATALYST GROUP) B"sic Electric"l Engineering 1. Kirchhoff s current l"w st"tes th"t (") net current flow "t the junction is positive (b) Hebr"ic sum of the currents meeting "t the junction is zero (c)

More information

Signaling-Embedded Preamble Design for Flexible Optical Transport Networks

Signaling-Embedded Preamble Design for Flexible Optical Transport Networks Signling-Embedded Premble Design for Flexible Opticl Trnsport Networks Linglong Di nd Zhocheng Wng Tsinghu Ntionl Lbortory for Informtion Science nd Technology, Deprtment of Electronic Engineering, Tsinghu

More information

Network-coded Cooperation for Multi-unicast with Non-Ideal Source-Relay Channels

Network-coded Cooperation for Multi-unicast with Non-Ideal Source-Relay Channels This full text pper ws peer reviewed t the direction of IEEE Communictions Society suject mtter experts for puliction in the IEEE ICC 2010 proceedings Network-coded Coopertion for Multi-unicst with Non-Idel

More information

Controlling Aggregate Interference under Adjacent Channel Interference Constraint in TV White Space

Controlling Aggregate Interference under Adjacent Channel Interference Constraint in TV White Space Controlling Aggregte Interference under Adjcent Chnnel Interference Constrint in TV White Spce Lei Shi, Ki Won Sung, nd Jens Znder KTH Royl Institute of Technology, Wireless@KTH, Stockholm, Sweden E-mil:

More information

A New Algorithm to Compute Alternate Paths in Reliable OSPF (ROSPF)

A New Algorithm to Compute Alternate Paths in Reliable OSPF (ROSPF) A New Algorithm to Compute Alternte Pths in Relile OSPF (ROSPF) Jin Pu *, Eric Mnning, Gholmli C. Shoj, Annd Srinivsn ** PANDA Group, Computer Science Deprtment University of Victori Victori, BC, Cnd Astrct

More information

Adaptive Network Coding for Wireless Access Networks

Adaptive Network Coding for Wireless Access Networks Adptive Network Coding for Wireless Access Networks Tun Trn School of Electricl Engineering nd Computer Science Oregon Stte University, Corvllis, Oregon 9733 Emil: trntu@eecs.orst.edu Thinh Nguyen School

More information

Geometric quantities for polar curves

Geometric quantities for polar curves Roerto s Notes on Integrl Clculus Chpter 5: Bsic pplictions of integrtion Section 10 Geometric quntities for polr curves Wht you need to know lredy: How to use integrls to compute res nd lengths of regions

More information

Application of Wavelet De-noising in Vibration Torque Measurement

Application of Wavelet De-noising in Vibration Torque Measurement IJCSI Interntionl Journl of Computer Science Issues, Vol. 9, Issue 5, No 3, September 01 www.ijcsi.org 9 Appliction of Wvelet De-noising in Vibrtion orque Mesurement Ho Zho 1 1 Jixing University, Jixing,

More information

BP-P2P: Belief Propagation-Based Trust and Reputation Management for P2P Networks

BP-P2P: Belief Propagation-Based Trust and Reputation Management for P2P Networks BP-PP: Belief Propgtion-Bsed Trust nd Reputtion Mngement for PP Networs Ermn Aydy School of Electricl nd Comp. Eng. Georgi Institute of Technology Atlnt, GA 333, USA Emil: eydy@gtech.edu Frmrz Feri School

More information

Energy-efficient scheduling and hybrid communication architecture for underwater littoral surveillance

Energy-efficient scheduling and hybrid communication architecture for underwater littoral surveillance Computer Communictions xxx (26) xxx xxx www.elsevier.com/locte/comcom Energy-efficient scheduling nd hybrid communiction rchitecture for underwter littorl surveillnce Mihel Crdei * Deprtment of Computer

More information

BP-P2P: Belief Propagation-Based Trust and Reputation Management for P2P Networks

BP-P2P: Belief Propagation-Based Trust and Reputation Management for P2P Networks 1 9th Annul IEEE Communictions Society Conference on Sensor, Mesh nd Ad Hoc Communictions nd Networs (SECON) BP-PP: Belief Propgtion-Bsed Trust nd Reputtion Mngement for PP Networs Ermn Aydy School of

More information

2-5-2 Calibration of Dipole Antennas

2-5-2 Calibration of Dipole Antennas 2 Reserch nd Development of Clibrtion Technology 2-5-2 Clibrtion of Dipole Antenns Iwo NISHIYAMA, Kojiro SAKAI, Tsutomu SUGIYAMA, Kouichi SBATA, nd Ktsumi FUJII This pper describes clibrtion method of

More information

On the Effectivity of Different Pseudo-Noise and Orthogonal Sequences for Speech Encryption from Correlation Properties

On the Effectivity of Different Pseudo-Noise and Orthogonal Sequences for Speech Encryption from Correlation Properties On the Effectivity of Different Pseudo-Noise nd Orthogonl Sequences for Speech Encryption from Correltion Properties V. Anil Kumr, Ahijit Mitr nd S. R. Mhdev Prsnn Astrct We nlyze the effectivity of different

More information

On the Description of Communications Between Software Components with UML

On the Description of Communications Between Software Components with UML On the Description of Communictions Between Softwre Components with UML Zhiwei An Dennis Peters Fculty of Engineering nd Applied Science Memoril University of Newfoundlnd St. John s NL A1B 3X5 zhiwei@engr.mun.c

More information

DP4T RF CMOS Switch: A Better Option to Replace the SPDT Switch and DPDT Switch

DP4T RF CMOS Switch: A Better Option to Replace the SPDT Switch and DPDT Switch Send Orders of Reprints t reprints@enthmscience.org 244 Recent Ptents on Electricl & Electronic Engineering 2012, 5, 244-248 DP4T RF CMOS Switch: A Better Option to Replce the SPDT Switch nd DPDT Switch

More information

Example. Check that the Jacobian of the transformation to spherical coordinates is

Example. Check that the Jacobian of the transformation to spherical coordinates is lss, given on Feb 3, 2, for Mth 3, Winter 2 Recll tht the fctor which ppers in chnge of vrible formul when integrting is the Jcobin, which is the determinnt of mtrix of first order prtil derivtives. Exmple.

More information

An Efficient SC-FDM Modulation Technique for a UAV Communication Link

An Efficient SC-FDM Modulation Technique for a UAV Communication Link electronics Article An Efficient SC-FDM Modultion Technique for UAV Communiction Link Sukhrob Aev 1, Oh-Heum Kwon 1, Suk-Hwn Lee 2 Ki-Ryong Kwon 1, * 1 Deprtment of IT Convergence Appliction Engineering,

More information

Nevery electronic device, since all the semiconductor

Nevery electronic device, since all the semiconductor Proceedings of Interntionl Joint Conference on Neurl Networks, Orlndo, Florid, USA, August 12-17, 2007 A Self-tuning for Rel-time Voltge Regultion Weiming Li, Xio-Hu Yu Abstrct In this reserch, self-tuning

More information

A Simple Approach to Control the Time-constant of Microwave Integrators

A Simple Approach to Control the Time-constant of Microwave Integrators 5 VOL., NO.3, MA, A Simple Approch to Control the Time-constnt of Microwve Integrtors Dhrmendr K. Updhyy* nd Rkesh K. Singh NSIT, Division of Electronics & Communiction Engineering New Delhi-78, In Tel:

More information

EET 438a Automatic Control Systems Technology Laboratory 5 Control of a Separately Excited DC Machine

EET 438a Automatic Control Systems Technology Laboratory 5 Control of a Separately Excited DC Machine EE 438 Automtic Control Systems echnology bortory 5 Control of Seprtely Excited DC Mchine Objective: Apply proportionl controller to n electromechnicl system nd observe the effects tht feedbck control

More information

LATEST CALIBRATION OF GLONASS P-CODE TIME RECEIVERS

LATEST CALIBRATION OF GLONASS P-CODE TIME RECEIVERS LATEST CALIBRATION OF GLONASS P-CODE TIME RECEIVERS A. Fos 1, J. Nwroci 2, nd W. Lewndowsi 3 1 Spce Reserch Centre of Polish Acdemy of Sciences, ul. Brtyc 18A, 00-716 Wrsw, Polnd; E-mil: fos@c.ww.pl; Tel.:

More information

Design and implementation of a high-speed bit-serial SFQ adder based on the binary decision diagram

Design and implementation of a high-speed bit-serial SFQ adder based on the binary decision diagram INSTITUTE OFPHYSICS PUBLISHING Supercond. Sci. Technol. 16 (23) 1497 152 SUPERCONDUCTORSCIENCE AND TECHNOLOGY PII: S953-248(3)67111-3 Design nd implementtion of high-speed it-seril SFQ dder sed on the

More information

Domination and Independence on Square Chessboard

Domination and Independence on Square Chessboard Engineering nd Technology Journl Vol. 5, Prt, No. 1, 017 A.A. Omrn Deprtment of Mthemtics, College of Eduction for Pure Science, University of bylon, bylon, Irq pure.hmed.omrn@uobby lon.edu.iq Domintion

More information

An Analog Baseband Approach for Designing Full-Duplex Radios

An Analog Baseband Approach for Designing Full-Duplex Radios An Anlog Bsend Approch for Designing Full-Duplex Rdios Brett Kufmn, Jorm Lilleerg, nd Behnm Azhng Center for Multimedi Communiction, Rice University, Houston, Texs, USA Centre for Wireless Communictions,

More information

A Slot-Asynchronous MAC Protocol Design for Blind Rendezvous in Cognitive Radio Networks

A Slot-Asynchronous MAC Protocol Design for Blind Rendezvous in Cognitive Radio Networks Globecom 04 - Wireless Networking Symposium A Slot-Asynchronous MAC Protocol Design for Blind Rendezvous in Cognitive Rdio Networks Xingy Liu nd Jing Xie Deprtment of Electricl nd Computer Engineering

More information

Design of Non-Uniformly Excited Linear Slot Arrays Fed by Coplanar Waveguide

Design of Non-Uniformly Excited Linear Slot Arrays Fed by Coplanar Waveguide Design of Non-Uniformly Excited Liner Slot Arrys Fed by Coplnr Wveguide 533 25 x Design of Non-Uniformly Excited Liner Slot Arrys Fed by Coplnr Wveguide JP Jcobs, J Joubert nd JW Odendl University of Pretori

More information

A Cluster-based TDMA System for Inter-Vehicle Communications *

A Cluster-based TDMA System for Inter-Vehicle Communications * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 30, 213-231 (2014) A Cluster-bsed TDMA System for Inter-Vehicle Communictions * Deprtment of Electricl Engineering Ntionl Sun Yt-Sen University Kohsiung,

More information